Get new jobs by email
- ...big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25... ...stands before us. Meet The Team The Dexcom Information Security organization protects Dexcom's patients, employees, and data...
- ...Head of Cloud, Infrastructure & IT Security Key Responsibilities Cloud & Infrastructure Leadership Own the overall cloud strategy... ...Qualifications ~ Bachelor's degree in Computer Science, Information Technology, or related field (Master's preferred). ~8–10+...
- ...Job Summary: The IT Security Engineer is responsible for implementing, managing, and maintaining the company's cybersecurity infrastructure... ...: Education and Experience Bachelor's degree in Information Technology, Computer Science, or related field. At least 3–...
- ...development in the Asia-Pacific region. Organizational Setting and Reporting Relationship The position of IT Specialist (Information Security) is assigned to the Cybersecurity & Compliance Unit within the Information Technology Department (ITD). You will be based at...
- ...Information Security Analyst (Sales Enablement Focus) Schedule: MondayFriday 9:00 AM5:00 PM Eastern Time Apply here: Overview Were looking for a detail-oriented Security & Compliance Analyst to own and manage customer security questionnaires RFPs and...
- ...Under the guidance of the Senior Analyst you will execute cyber security risk strategies support supplier assessments contribute to risk... ...industry trends threat developments and benchmarking to inform best practices. Support Third-Party Risk Management (TPRM) teams...
- ...Position: Senior IT Analyst (Security) Location: Mandaluyong, Manila, Philippines Employment Type: IDIQ Staff Augmentation Contract Duration: 1 year (subject to extension) Work Arrangement Hybrid: Onsite 3 days/week Hours: 8:00 AM – 5:00 PM Manila...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information Technology First Line of Defense you will play a critical role in safeguarding the organizations IT environment. This role involves...
- ...The Virtual Chief Information Security Officer (vCISO) plays a critical role in providing strategic cybersecurity leadership and guidance to several of our small and medium-sized business (SMB) clients. This role involves delivering on-demand CISO services tailored to...
- ...(GDS Philippines) Todays world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information... ...is central to doing business and everyone in EY Information Security has a critical role to play. Join a global team of over 950...
- ...landscape of tomorrow. Summary of This Role Evaluates tests recommends develops coordinates monitors and maintains information security policies procedures and systems including hardware firmware and software . Ensures that IS security architecture/designs plans...
- Position Overview: As a Security Architect, you will engage across various domains within information security, focusing on: Evaluating and auditing existing security controls and solutions. Designing and implementing new security measures. Providing expert counsel...
- ...As an IT Governance Manager, you will support governance, compliance, and security-related initiatives within the IT department. Reporting to the Senior Director of Information Systems, this role is ideal for a detail-oriented and analytical professional who wants to...
- ...Vietnam - relocation assistance will be provided *** Title: Security Architect Role Overview We are seeking an... ...software development environment. ~ Degree in Computer Science, Information Systems, or equivalent technical qualification. ~ Hands-on experience...
- ...real impact here. This is the Kroll's difference. Kroll's Security Operation's Center helps firm manage cybersecurity risks at every... ...and perform analysis, while integrating the results and information needed to proactively protect the enterprise. Provide security...
- Production Security Our Mission Our goal is for everyone to make bolder choices with their finances. To get there, we're creating... ...teams. Required Qualifications ~ Bachelor Degree in Information Technology, Computer Science, or equivalent ~3+ years of...
- ...minutes from Makati district, the capital's financial, cultural and entertainment hub with first-class shopping malls. DUTIES The Security Supervisor shall drive the day-to-day Security Operation through the effective and efficient leadership of a team of Security...
- ...What Information Security and Risk contributes to Cardinal Health Information Technology oversees the effective development delivery and operation of computing and information services. This function anticipates plans and delivers Information Technology solutions and...
- ...Internal Audit management and staff in Geneva, Manila and in the field. S/he will support the executive assistant in ensuring that information management and administrative practices and processes are complied with and coherent within the unit. S/he will act as back-up...
- This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation... ...practice Work with Security leadership to present information and influence change What we are looking for Proven track...
- ...behavior and cognitive assessments. ~ Preferably, at least two of the following certifications: CompTIA A+, CompTIA Network+, CompTIA Security+, 3cx Basic Certified Engineer. ~ Able to provide NBI Clearance (for PH applicants). Compensation Pay rate starts at Php...
- ...Align processes with ISO27001, CIS benchmarks, and internal security standards. Support audits by providing evidence of vulnerability... .... What We Value Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). At...
- In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how... ...need to use industry best practices paired with emerging threat information to to promote risk identification, quantification, impact...
- ...Reporting Relationship The position of Advisor, SEC and Head, Information Access Unit is assigned to the Information Access Unit (IAU)... ...and operational plans to improve the quality, shareability, security, and timeliness of information disclosure and responses to information...
- ...Network Security Engineers offer support for a wide variety of Network security-related devices. This includes, without being limited... ...particular issue are logged Ensuring all necessary parties are informed of actions being taken Ensuring all processes are documented...
- ...About the Role The role of this position is to support the Security Manager in ensuring the effective protection of ATI's port facilities, personnel, and assets. The Assistant Security Manager will assist in overseeing security operations, implementing policies and...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent centralized authorization empowering... ...working experience at the enterprise level with security information and event management endpoint detection and response network detection...
- ...Were looking for a Security Engineer with secured Application Development background to join our Global Cybersecurity Services Application... ...to the vaults Participate in project related meetings: information gathering solution design project checkpoints Keeping...
- ...websites or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks...
- ...your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. You will use...
